Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-27281

Опубликовано: 21 мар. 2024
Источник: redhat
CVSS3: 4.5

Описание

An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in RDoc) as a YAML file, object injection and resultant remote code execution are possible because there are no restrictions on the classes that can be restored. (When loading the documentation cache, object injection and resultant remote code execution are also possible if there were a crafted cache.) The main fixed version is 6.6.3.1. For Ruby 3.0 users, a fixed version is rdoc 6.3.4.1. For Ruby 3.1 users, a fixed version is rdoc 6.4.1.1. For Ruby 3.2 users, a fixed version is rdoc 6.5.1.1.

A flaw was found in Rubygem RDoc. When parsing .rdoc_options used for configuration in RDoc as a YAML file there are no restrictions on the classes that can be restored. This issue may lead to object injection, resulting in remote code execution.

Отчет

An attacker would need to provide a maliciously crafted configuration file or documentation cache to a user in order to trigger this vulnerability.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6rubyOut of support scope
Red Hat Enterprise Linux 7rubyOut of support scope
Red Hat OpenStack Platform 16.1puppet-dnsNot affected
Red Hat OpenStack Platform 16.2puppet-dnsNot affected
Red Hat OpenStack Platform 16.2puppet-memcachedNot affected
Red Hat OpenStack Platform 17.1puppet-memcachedNot affected
Red Hat Satellite 6satellite-installerWill not fix
Red Hat Software Collectionsrh-ruby30-rubyAffected
Red Hat Storage 3rubyAffected
Red Hat Enterprise Linux 8rubyFixedRHSA-2024:350030.05.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=2270749ruby: RCE vulnerability with .rdoc_options in RDoc

4.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.5
ubuntu
около 1 года назад

An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in RDoc) as a YAML file, object injection and resultant remote code execution are possible because there are no restrictions on the classes that can be restored. (When loading the documentation cache, object injection and resultant remote code execution are also possible if there were a crafted cache.) The main fixed version is 6.6.3.1. For Ruby 3.0 users, a fixed version is rdoc 6.3.4.1. For Ruby 3.1 users, a fixed version is rdoc 6.4.1.1. For Ruby 3.2 users, a fixed version is rdoc 6.5.1.1.

CVSS3: 4.5
nvd
около 1 года назад

An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in RDoc) as a YAML file, object injection and resultant remote code execution are possible because there are no restrictions on the classes that can be restored. (When loading the documentation cache, object injection and resultant remote code execution are also possible if there were a crafted cache.) The main fixed version is 6.6.3.1. For Ruby 3.0 users, a fixed version is rdoc 6.3.4.1. For Ruby 3.1 users, a fixed version is rdoc 6.4.1.1. For Ruby 3.2 users, a fixed version is rdoc 6.5.1.1.

CVSS3: 4.5
msrc
около 1 года назад

Описание отсутствует

CVSS3: 4.5
debian
около 1 года назад

An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in ...

CVSS3: 4.5
github
около 1 года назад

RDoc RCE vulnerability with .rdoc_options

4.5 Medium

CVSS3